Phishing & Impersonation (sec+)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:39 PM on 12/2/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

9 Terms

1
New cards

Phishing

a type of online fraud where criminals impersonate legitimate sources like companies or individuals to trick people into revealing sensitive information

2
New cards

Typosquatting

where malicious actors register domain names that are slight misspellings or variations of popular, legitimate websites to intercept traffic from users who make typographical errors

3
New cards

Pretexting

attack where a scammer creates a fabricated scenario to manipulate a victim into divulging sensitive information or granting unauthorized access

4
New cards

Impersonation

attackers pretending to be someone they aren’t

5
New cards

Watering hole attack

an attack where hackers infect a website the target group is likely to visit, hoping the victims get infected when they go there

6
New cards

Dynamic-link library (DLL) Injection

a technique where an attacker forces a malicious DLL into a running process to run code inside it

7
New cards

Buffer overflow

an attack where more data is written to a memory buffer than it can hold, causing the program to overwrite nearby memory.

8
New cards

Race Condition

A flaw where the behavior of a system changes depending on the timing of two or more processes running at the same time

9
New cards

TOCTOU (Time of Check to Time of Use)

A race condition where an attacker changes something between when it’s checked and when it’s used.